A New Bayesian Approach to Exploring Damaged Assets by Monitoring Mission Failures Caused by Undetected Attack
暂无分享,去创建一个
[1] J. Holsopple,et al. Handling temporal and functional changes for mission impact assessment , 2013, 2013 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA).
[2] Gabriel Jakobson,et al. Mission cyber security situation assessment using impact dependency graphs , 2011, 14th International Conference on Information Fusion.
[3] Larry W Fortson,et al. Towards the Development of a Defensive Cyber Damage and Mission Impact Methodology , 2012 .
[4] Natalie Nakhla,et al. Automated computer network defence using ARMOUR: Mission-oriented decision support and vulnerability mitigation , 2017, 2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA).
[5] Leyla Bilge,et al. Before we knew it: an empirical study of zero-day attacks in the real world , 2012, CCS.
[6] Peng Liu,et al. Using Bayesian networks for cyber security analysis , 2010, 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN).
[7] Martín Barrère,et al. Exact Inference Techniques for the Analysis of Bayesian Attack Graphs , 2015, IEEE Transactions on Dependable and Secure Computing.
[8] Xiaoyan Sun,et al. Who Touched My Mission: Towards Probabilistic Mission Impact Assessment , 2015, SafeConfig@CCS.
[9] Michael A. Arbib,et al. The handbook of brain theory and neural networks , 1995, A Bradford book.
[10] Ralf Möller,et al. Context- and bias-free probabilistic mission impact assessment , 2017, Comput. Secur..